Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
0b56b87c518fa19450742ddfe50246cd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b56b87c518fa19450742ddfe50246cd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0b56b87c518fa19450742ddfe50246cd_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
0b56b87c518fa19450742ddfe50246cd
-
SHA1
0564189726cc45d19bcc95e7d0dff9520b7046d2
-
SHA256
c4bd625a5f330619c523e5b04a53cbc60b8a7080090a432fbcac83e41f005156
-
SHA512
8b3eb5bdbd783592f5e6f3830f8740a9452324d0f5775dafb94e2f1049592d2aaa29d85e8cc22352ca10402cb8d14336ce64d4113963b85d9106b2223ae880da
-
SSDEEP
24576:dyU3AjRtEkJ1EzHx+z7wysE8ksIiJqSGYYWFY0of4ID71:w/J2zRywS9i0CFY0oAG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2596 5199718108.exe -
Loads dropped DLL 4 IoCs
pid Process 2768 cmd.exe 2768 cmd.exe 2596 5199718108.exe 2596 5199718108.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\0b56b87c518fa19450742ddfe50246cd_JaffaCakes118 = "\"C:\\Users\\Admin\\AppData\\Local\\5199718108.exe\" 0 49 " 0b56b87c518fa19450742ddfe50246cd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\5199718108 = "\"C:\\Users\\Admin\\AppData\\Local\\5199718108.exe\" 0 28 " 5199718108.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b56b87c518fa19450742ddfe50246cd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5199718108.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2604 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2596 5199718108.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2596 5199718108.exe 2596 5199718108.exe 2596 5199718108.exe 2596 5199718108.exe 2596 5199718108.exe 2596 5199718108.exe 2596 5199718108.exe 2596 5199718108.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2596 5199718108.exe 2596 5199718108.exe 2596 5199718108.exe 2596 5199718108.exe 2596 5199718108.exe 2596 5199718108.exe 2596 5199718108.exe 2596 5199718108.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2768 2720 0b56b87c518fa19450742ddfe50246cd_JaffaCakes118.exe 31 PID 2720 wrote to memory of 2768 2720 0b56b87c518fa19450742ddfe50246cd_JaffaCakes118.exe 31 PID 2720 wrote to memory of 2768 2720 0b56b87c518fa19450742ddfe50246cd_JaffaCakes118.exe 31 PID 2720 wrote to memory of 2768 2720 0b56b87c518fa19450742ddfe50246cd_JaffaCakes118.exe 31 PID 2768 wrote to memory of 2604 2768 cmd.exe 33 PID 2768 wrote to memory of 2604 2768 cmd.exe 33 PID 2768 wrote to memory of 2604 2768 cmd.exe 33 PID 2768 wrote to memory of 2604 2768 cmd.exe 33 PID 2768 wrote to memory of 2596 2768 cmd.exe 34 PID 2768 wrote to memory of 2596 2768 cmd.exe 34 PID 2768 wrote to memory of 2596 2768 cmd.exe 34 PID 2768 wrote to memory of 2596 2768 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b56b87c518fa19450742ddfe50246cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b56b87c518fa19450742ddfe50246cd_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\36815692.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v 0b56b87c518fa19450742ddfe50246cd_JaffaCakes118 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2604
-
-
C:\Users\Admin\AppData\Local\5199718108.exeC:\Users\Admin\AppData\Local\519971~1.EXE -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440B
MD5ac6891f163c49b517bdb9d7eb974288e
SHA1f2590658d103c22865e004d9269a8b82a4238606
SHA256c3734775197bc359f69a631c6af89ba8faf88294a7f01512949972a807b41c06
SHA512db9504d0a6b3ba8e7123ce3f718e74dd416ac9a6086a343ab13791ae45d316a63a06ee8227e1fd6baf0c7c6b5a49a710f8143c81a332eac347f17f55194484e8
-
Filesize
1.1MB
MD50b56b87c518fa19450742ddfe50246cd
SHA10564189726cc45d19bcc95e7d0dff9520b7046d2
SHA256c4bd625a5f330619c523e5b04a53cbc60b8a7080090a432fbcac83e41f005156
SHA5128b3eb5bdbd783592f5e6f3830f8740a9452324d0f5775dafb94e2f1049592d2aaa29d85e8cc22352ca10402cb8d14336ce64d4113963b85d9106b2223ae880da